A comprehensive survey on graph anomaly detection with deep learning

X Ma, J Wu, S Xue, J Yang, C Zhou… - … on Knowledge and …, 2021 - ieeexplore.ieee.org
Anomalies are rare observations (eg, data records or events) that deviate significantly from
the others in the sample. Over the past few decades, research on anomaly mining has …

Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

A unifying review of deep and shallow anomaly detection

L Ruff, JR Kauffmann, RA Vandermeulen… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Deep learning approaches to anomaly detection (AD) have recently improved the state of
the art in detection performance on complex data sets, such as large collections of images or …

Progress in outlier detection techniques: A survey

H Wang, MJ Bah, M Hammad - Ieee Access, 2019 - ieeexplore.ieee.org
Detecting outliers is a significant problem that has been studied in various research and
application areas. Researchers continue to design robust schemes to provide solutions to …

Outlier detection: Methods, models, and classification

A Boukerche, L Zheng, O Alfandi - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Over the past decade, we have witnessed an enormous amount of research effort dedicated
to the design of efficient outlier detection techniques while taking into consideration …

A survey of network anomaly detection techniques

M Ahmed, AN Mahmood, J Hu - Journal of Network and Computer …, 2016 - Elsevier
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …

Data mining for the internet of things: literature review and challenges

F Chen, P Deng, J Wan, D Zhang… - International …, 2015 - journals.sagepub.com
The massive data generated by the Internet of Things (IoT) are considered of high business
value, and data mining algorithms can be applied to IoT to extract hidden information from …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

Zero-day attack detection: a systematic literature review

R Ahmad, I Alsmadi, W Alhamdani… - Artificial Intelligence …, 2023 - Springer
With the continuous increase in cyberattacks over the past few decades, the quest to
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …

[HTML][HTML] Machine learning based approach to exam cheating detection

F Kamalov, H Sulieman, D Santandreu Calonge - Plos one, 2021 - journals.plos.org
The COVID-19 pandemic has impelled the majority of schools and universities around the
world to switch to remote teaching. One of the greatest challenges in online education is …